CN105743651A - Method and apparatus for utilizing card application in chip security domain, and application terminal - Google Patents

Method and apparatus for utilizing card application in chip security domain, and application terminal Download PDF

Info

Publication number
CN105743651A
CN105743651A CN201410764948.4A CN201410764948A CN105743651A CN 105743651 A CN105743651 A CN 105743651A CN 201410764948 A CN201410764948 A CN 201410764948A CN 105743651 A CN105743651 A CN 105743651A
Authority
CN
China
Prior art keywords
application
card
digital certificate
terminal
card application
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410764948.4A
Other languages
Chinese (zh)
Other versions
CN105743651B (en
Inventor
劳剑明
王巍
刘志诚
唐锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Aspire Digital Technologies Shenzhen Co Ltd
Original Assignee
Aspire Digital Technologies Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Aspire Digital Technologies Shenzhen Co Ltd filed Critical Aspire Digital Technologies Shenzhen Co Ltd
Priority to CN201410764948.4A priority Critical patent/CN105743651B/en
Publication of CN105743651A publication Critical patent/CN105743651A/en
Application granted granted Critical
Publication of CN105743651B publication Critical patent/CN105743651B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention relates to a method and apparatus for utilizing card applications in a chip security domain. The method comprises the following steps: S1, according to a card application access capability request of an application terminal, obtaining available card application list from a trusted service management platform; S2, based on the card application list, applying for authorization of application of a digital certificate from a security authentication center; S3, establishing a binding relation between the digital certificate and the available card application list; S4, issuing the digital certificate and an SDK packet packaged with an APDU instruction of each card application to the application terminal; and S5, according to the application terminal, when the card applications need to be used, scheduling the digital certificate issued by SDK packet for authentication, and returning to the available card application list. The invention further relates to an application terminal, and a method for an application terminal to use card applications in a chip security domain. According to the invention, the threshold for the application terminal to use the card applications in the chip security domain can be mitigated, the card application promotion capability of the application terminal is enhanced, and the utilization security, consistency, integrity and undeniability of the card applications are guaranteed.

Description

The card application using method in chip secure territory, device and application terminal
Technical field
The present invention relates to field of data communication, more particularly, it relates to the card application using method in a kind of chip secure territory, device and application terminal.
Background technology
NFC (NearFieldCommunication) is as a kind of in-plant wireless communication technology, it is provided that a kind of more direct, safer on-the-spot interaction solution.It can allow for carrying out between electronic equipment contactless Point-to-Point Data Transmission, it is achieved data exchange, access content and service.There is this technology, there is the instrument that the mobile phone of NFC function is no longer simply made a phone call, sends short messages and surfed the Net, various electronic card application (such as bank card, mass transit card, member card, campus/enterprise's all-purpose card etc.) can also be loaded, it is achieved various based on the service application paying class and non-pay class.
For NFC mobile phone client, it uses the card application in chip secure territory (SE), is based primarily upon below step:
1, after card application provider (service provider such as bank card, other entity card) completes card application and development, issue to TSM (TrustedServiceManager, trusted service manages) platform application application;
2, card application is after examination & verification, and distribution application program identification (AID) loads an application into TSM platform;
3, the card application provided by cell-phone customer terminal downloading card application provider and cell-phone customer terminal;
4, for needing the cell-phone customer terminal of the card application in chip secure territory (SE), it is necessary to cell-phone customer terminal is set up and associating that card is applied at TSM platform, after carrying out the exploitation that card application uses, corresponding card application power can be used.
It is following not enough that existing this cell-phone customer terminal uses card application power to exist:
1, each card application has different interfaces, and the standard being both needed to according to card application provider provides for each card application is developed;
2, client-access card application, it is necessary to register at TSM platform, lacks a kind of by multiple application integration ability together;
3, use card application to carry out follow-up Business Processing, when using, all need to carry out online authentication process every time.
In sum, outside cell-phone customer terminal uses the card application in chip secure territory (SE), technically, lacks the unified standard criterion instruction calling card;From management, new card application is used to be both needed to apply for;Business, enable need to by online authentication every time, it is impossible to carry out in business uses, to reduce the frequency of interaction of online authentication again.
Summary of the invention
The technical problem to be solved in the present invention is in that, for the drawbacks described above of prior art, it is provided that the method for the card application in the card application using method in a kind of chip secure territory and device and a kind of application terminal and its use chip secure territory.
The technical solution adopted for the present invention to solve the technical problems is: proposes the card application using method in a kind of chip secure territory, comprises the steps:
S1, card application access ability according to application terminal are asked, and obtain available card list of application to trusted service management platform;
S2, according to described available card list of application, to the digital certificate that security authentication center application is licensed;
S3, described digital certificate and described available card list of application are set up binding relationship;
S4, by described digital certificate and be packaged with the SDK bag of APDU instruction of each card application and be issued to described application terminal;
S5, according to described application terminal need use card application time call described SDK bag send digital certificate be authenticated authentication, return can use card list of application.
According in method of the present invention, described step S1 farther includes:
The card application access ability request that S11, reception application terminal are sent by application provider's platform, at least includes client-side program title, developer's information in described request;
S12, to described card application access ability request audit;
S13, the card application access ability request passed through for examination & verification, obtain available card list of application to trusted service management platform.
According to, in method of the present invention, described step S13 obtaining available card list of application to trusted service management platform in the way of interactive interfacing.
The present invention solves that its technical problem also proposes the card application use device in a kind of chip secure territory, including:
Card application acquisition module, asks for the card application access ability according to application terminal, obtains available card list of application to trusted service management platform;
Certificate request module, for according to described available card list of application, to the digital certificate that security authentication center application is licensed;
Binding module, for setting up binding relationship by described digital certificate and described available card list of application;
Sending module, for being issued to described application terminal by the SDK bag of described digital certificate and the APDU instruction being packaged with each card application;
Authentication module, the digital certificate being used for calling when needing to use card application the transmission of described SDK bag according to described application terminal is authenticated authentication, returns available card list of application.
According in device of the present invention, described card application acquisition module farther includes:
Receive unit, for receiving the card application access ability request that application terminal is sent by application provider's platform, described request at least includes client-side program title, developer's information;
Examination & verification unit, for auditing described card application access ability request;
Acquiring unit, for the card application access ability request passed through for examination & verification, obtains available card list of application to trusted service management platform.
According in device of the present invention, described acquiring unit obtains available card list of application to trusted service management platform in the way of interactive interfacing.
The present invention solves that its technical problem also proposes a kind of method that application terminal uses the card application in chip secure territory, comprise the steps:
S1, sending card application access ability are asked, and installation is asked, based on this card application access ability, the digital certificate issued and is packaged with the SDK bag of the APDU instruction that each card is applied;
S2, needs use card application time call described SDK bag send described digital certificate be authenticated authentication, it is thus achieved that can use card list of application;
S3, by described SDK bag send APDU instruction, call corresponding card application and interact process.
In one embodiment, also include according to method of the present invention:
S4, the result applying return according to described card and business platform carry out service interaction process.
The present invention solves that its technical problem also proposes a kind of application terminal, including:
Access ability request module applied by card, asks for sending card application access ability, and installation is asked, based on this card application access ability, the digital certificate issued and is packaged with the SDK bag of the APDU instruction that each card is applied;
Acquisition module applied by available card, is authenticated authentication for calling the described SDK bag described digital certificate of transmission when needs use card application, it is thus achieved that available card list of application;
Card application interactive module, for sending APDU instruction by described SDK bag, calls corresponding card application and interacts process.
In one embodiment, also include according to application terminal of the present invention:
Service interaction module, carries out service interaction process for the result returned according to described card application with business platform.
Implement the present invention, have the advantages that the APDU instruction of each card application is packaged by the present invention, a set of easy command interface is provided, by SDK mode for application terminal, alleviate the threshold that application terminal uses the card application in chip secure territory, increase the card application ability of application terminal.It is mutual with what card was applied that the present invention completes cell-phone customer terminal by Security Middleware, the application terminal of SDK can be used after authorizing, when initializing, the digital certificate licensed is applied by Security Middleware platform application, set up the binding relationship that application terminal can use card to apply, time application terminal uses card application afterwards, application authority checking is carried out by digital certificate, the list of available card application can be obtained, thus ensure that the safety of card application use, concordance, integrity, non repudiation after checking.
Accompanying drawing explanation
Below in conjunction with drawings and Examples, the invention will be further described, in accompanying drawing:
The process schematic of application terminal acquisition Security Middleware in operational version applied by the card that Fig. 1 is chip secure territory of the present invention;
The process schematic of application terminal use Security Middleware in operational version applied by the card that Fig. 2 is chip secure territory of the present invention;
Fig. 3 is the flow chart of the card application using method in chip secure territory according to an embodiment of the invention;
Fig. 4 is the building-block of logic of the card application use device in chip secure territory according to an embodiment of the invention;
Fig. 5 is that application terminal uses the flow chart of the method for the card application in chip secure territory according to an embodiment of the invention;
Fig. 6 is the building-block of logic of application terminal according to an embodiment of the invention.
Detailed description of the invention
In order to make the purpose of the present invention, technical scheme and advantage clearly understand, below in conjunction with drawings and Examples, the present invention is further elaborated.Should be appreciated that specific embodiment described herein is only in order to explain the present invention, is not intended to limit the present invention.
In order to reduce the threshold that NFC mobile phone uses the card application in chip secure territory (SE), increase the card application ability of NFC mobile phone, the present invention devises the card application operational version in a set of chip secure territory, APDU (ApplicationProtocolDataUnit by each card application, Application Protocol Data Unit) instruction is packaged being formed the Security Middleware of SDK packet form so that application terminal by Security Middleware complete with card application mutual.For the application terminal that can use SDK bag after authorizing, applied the digital certificate licensed by Security Middleware platform application, be handed down to application terminal together with SDK bag, and binding relationship is set up in the available card application of this digital certificate Yu application terminal.Time application terminal uses card application afterwards, carry out application authority checking by digital certificate, the list of available card application after checking, can be obtained.
Fig. 1 illustrates that the card in chip secure territory of the present invention is applied application terminal in operational version and obtained the process schematic of Security Middleware.As it is shown in figure 1, to Security Middleware platform 40, application terminal 10 applies for that Security Middleware, application information include the information such as client-side program title, developer by application provider's platform 20 of its client.This application is audited by Security Middleware platform 40, including examination & verification developer's information, application function etc., also includes Malicious Code Detection, sensitive word detection, system access right detection etc..For passing through the Security Middleware application audited, Security Middleware platform 40 obtains available card list of application to TSM platform 30.Then Security Middleware platform 40 licensing according to application platform provider platform 20, to the digital certificate of security authentication center 50 application application, and sets up binding relationship by this digital certificate and available card list of application.Then, Security Middleware platform 40 by digital certificate and is packaged with SDK bag of APDU instruction of each card application and is handed down to application terminal 10 and installs.
Fig. 2 illustrates that the card in chip secure territory of the present invention is applied application terminal in operational version and used the process schematic of Security Middleware after getting Security Middleware.As in figure 2 it is shown, after the client terminal start-up of application terminal 10, call Security Middleware SDK bag by applying the digital certificate authorized and carry out authorization identifying and the authentication of available card application to Security Middleware platform 40.After authentication, the available card list of application that this digital certificate is bound by Security Middleware platform 40 returns to application terminal 10.Then, the card application that application terminal 10 is sent in APDU instruction calls chip secure territory 60 by SDK bag interacts process, for instance calls card application and carries out obtaining random number, signature, data encryption etc..Then, the result that application terminal 10 returns according to card application, carry out service interaction with business platform 70, be accomplished by card and the Business Processing provided is provided.
Based on the card application operational version in the application chip secure territory described above, the present invention proposes card application using method and the device in a kind of chip secure territory being applied to Security Middleware platform 40 side.
Fig. 3 illustrates the flow chart of the card application using method 100 in chip secure territory according to an embodiment of the invention.As it is shown in figure 1, the method 100 comprises the steps:
In step S101, ask according to the card application access ability of application terminal, obtain available card list of application to TSM platform.In concrete example, this step S101 can farther include: receives the card application access ability request that application terminal is sent by application provider's platform, includes client-side program title, developer's information etc. in described request;Then described card application access ability request being audited, described examination & verification includes examination & verification developer's information, application function etc., also includes Malicious Code Detection, sensitive word detection, system access right detection etc.;Then the card application access ability request passed through for examination & verification, obtains available card list of application to TSM platform in the way of such as interactive interfacing.
In later step S102, according to described available card list of application, to the digital certificate that security authentication center application is licensed.
In later step S103, described digital certificate and described available card list of application are set up binding relationship.
In later step S104, the SDK bag of described digital certificate and the APDU instruction being packaged with each card application is issued to application terminal.
In later step S105, the digital certificate calling the transmission of described SDK bag according to application terminal when needing to use card application is authenticated authentication, returns available card list of application.
Fig. 4 illustrates that the card application in chip secure territory according to an embodiment of the invention uses the building-block of logic of device 200.As in figure 2 it is shown, this device 200 includes card application acquisition module 210, certificate request module 220, binding module 230, sending module 240 and authentication module 250.Wherein, card application acquisition module 210 is asked for the card application access ability according to application terminal, obtains available card list of application to TSM platform.Certificate request module 220 is for according to described available card list of application, to the digital certificate that security authentication center application is licensed.Binding module 230 is for setting up binding relationship by described digital certificate and described available card list of application.Sending module 240 is for being issued to application terminal by the SDK bag of described digital certificate and the APDU instruction being packaged with each card application.Authentication module 250 is used for calling when needing to use card application according to application terminal the digital certificate of described SDK bag transmission and is authenticated authentication, returns available card list of application.
In concrete example, card application acquisition module 210 farther includes to receive unit 211, examination & verification unit 212 and acquiring unit 213.Wherein, receive unit 211 for receiving the card application access ability request that application terminal is sent by application provider's platform, described request at least includes client-side program title, developer's information.Examination & verification unit 212 is for auditing described card application access ability request.Acquiring unit 213, for the card application access ability request passed through for examination & verification, obtains available card list of application to TSM platform.Such as, acquiring unit 213 mode of interactive interfacing can obtain available card list of application to TSM platform.
Based on the card application operational version in the application chip secure territory described above, the present invention also proposes a kind of method that application terminal being applied to side, application terminal 10 uses the card application in chip secure territory.Fig. 5 illustrates that application terminal uses the flow chart of the method 300 of the card application in chip secure territory according to an embodiment of the invention.As it is shown in figure 5, the method 300 comprises the steps:
In step S301, sending card application access ability is asked, and installation is asked, based on this card application access ability, the digital certificate issued and is packaged with the SDK bag of the APDU instruction that each card is applied.
In later step S302, call the described SDK bag described digital certificate of transmission when needs use card application and be authenticated authentication, it is thus achieved that available card list of application.
In later step S303, send APDU instruction by described SDK bag, call corresponding card application and interact process.
In later step S304, carry out service interaction process according to the result that described card application returns with business platform.
Based on the card application operational version in the application chip secure territory described above, the present invention also proposes a kind of application terminal.Fig. 6 illustrates the building-block of logic of application terminal 400 according to an embodiment of the invention.As described in Figure 6, application terminal 400 includes card application access ability request module 410, available card application acquisition module 420, card application interactive module 430 and service interaction module 440.Wherein, card application access ability request module 410 is for asking to Security Middleware platform 40 sending card application access ability, and installs the digital certificate that Security Middleware platform 40 issues based on the request of this card application access ability and the SDK bag being packaged with each APDU instruction blocking and applying.Available card is applied acquisition module 420 and is authenticated authentication for calling described SDK bag transmission described digital certificate to Security Middleware platform 40 when needs use card application, it is thus achieved that available card list of application.Card application interactive module 430 is for sending APDU instruction by described SDK bag, and the corresponding card application called in chip secure territory 60 interacts process.Service interaction module 440 carries out service interaction process for the result returned according to described card application with business platform 70.
In a specific embodiment according to the present invention, digital certificate algorithm mark and data structure that application authorizes are as follows:
In a specific embodiment according to the present invention, the instruction of Security Middleware SDK encapsulation includes:
Sequence number Order Function describes
1 Generate RSA KEY Generate RSA key pair
2 Select File Select file
3 Read Data Read data
4 Write Data Write data
5 Data Compress Data compression
6 Digital Signatures Digital signature
7 Signatures Verify Signature verification
8 Data Encrypt Data encryption
9 Data Decrypt Data deciphering
10 Create Random Num Produce random number
11 Operation Verify Authenticating operation
The foregoing is only presently preferred embodiments of the present invention, not in order to limit the present invention, all any amendment, equivalent replacement and improvement etc. made within the spirit and principles in the present invention, should be included within protection scope of the present invention.

Claims (10)

1. the card application using method in a chip secure territory, it is characterised in that comprise the steps:
S1, card application access ability according to application terminal are asked, and obtain available card list of application to trusted service management platform;
S2, according to described available card list of application, to the digital certificate that security authentication center application is licensed;
S3, described digital certificate and described available card list of application are set up binding relationship;
S4, by described digital certificate and be packaged with the SDK bag of APDU instruction of each card application and be issued to described application terminal;
S5, according to described application terminal need use card application time call described SDK bag send digital certificate be authenticated authentication, return can use card list of application.
2. method according to claim 1, it is characterised in that described step S1 farther includes:
The card application access ability request that S11, reception application terminal are sent by application provider's platform, at least includes client-side program title, developer's information in described request;
S12, to described card application access ability request audit;
S13, the card application access ability request passed through for examination & verification, obtain available card list of application to trusted service management platform.
3. method according to claim 2, it is characterised in that obtain available card list of application to trusted service management platform in the way of interactive interfacing in described step S13.
4. the card application in a chip secure territory uses device, it is characterised in that including:
Card application acquisition module, asks for the card application access ability according to application terminal, obtains available card list of application to trusted service management platform;
Certificate request module, for according to described available card list of application, to the digital certificate that security authentication center application is licensed;
Binding module, for setting up binding relationship by described digital certificate and described available card list of application;
Sending module, for being issued to described application terminal by the SDK bag of described digital certificate and the APDU instruction being packaged with each card application;
Authentication module, the digital certificate being used for calling when needing to use card application the transmission of described SDK bag according to described application terminal is authenticated authentication, returns available card list of application.
5. device according to claim 4, it is characterised in that described card application acquisition module farther includes:
Receive unit, for receiving the card application access ability request that application terminal is sent by application provider's platform, described request at least includes client-side program title, developer's information;
Examination & verification unit, for auditing described card application access ability request;
Acquiring unit, for the card application access ability request passed through for examination & verification, obtains available card list of application to trusted service management platform.
6. device according to claim 5, it is characterised in that described acquiring unit obtains available card list of application to trusted service management platform in the way of interactive interfacing.
7. the method that an application terminal uses the card in chip secure territory to apply, it is characterised in that comprise the steps:
S1, sending card application access ability are asked, and installation is asked, based on this card application access ability, the digital certificate issued and is packaged with the SDK bag of the APDU instruction that each card is applied;
S2, needs use card application time call described SDK bag send described digital certificate be authenticated authentication, it is thus achieved that can use card list of application;
S3, by described SDK bag send APDU instruction, call corresponding card application and interact process.
8. method according to claim 7, it is characterised in that also include:
S4, the result applying return according to described card and business platform carry out service interaction process.
9. an application terminal, it is characterised in that including:
Access ability request module applied by card, asks for sending card application access ability, and installation is asked, based on this card application access ability, the digital certificate issued and is packaged with the SDK bag of the APDU instruction that each card is applied;
Acquisition module applied by available card, is authenticated authentication for calling the described SDK bag described digital certificate of transmission when needs use card application, it is thus achieved that available card list of application;
Card application interactive module, for sending APDU instruction by described SDK bag, calls corresponding card application and interacts process.
10. application terminal according to claim 9, it is characterised in that described application terminal also includes:
Service interaction module, carries out service interaction process for the result returned according to described card application with business platform.
CN201410764948.4A 2014-12-11 2014-12-11 The card in chip secure domain is using method, apparatus and application terminal Active CN105743651B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410764948.4A CN105743651B (en) 2014-12-11 2014-12-11 The card in chip secure domain is using method, apparatus and application terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410764948.4A CN105743651B (en) 2014-12-11 2014-12-11 The card in chip secure domain is using method, apparatus and application terminal

Publications (2)

Publication Number Publication Date
CN105743651A true CN105743651A (en) 2016-07-06
CN105743651B CN105743651B (en) 2019-06-04

Family

ID=56240568

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410764948.4A Active CN105743651B (en) 2014-12-11 2014-12-11 The card in chip secure domain is using method, apparatus and application terminal

Country Status (1)

Country Link
CN (1) CN105743651B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107093078A (en) * 2017-03-14 2017-08-25 南方城墙信息安全科技有限公司 Chip card card sending system and method
WO2019007145A1 (en) * 2017-07-03 2019-01-10 中兴通讯股份有限公司 Sfs access control method and system, sfs and terminal device
CN111291366A (en) * 2020-05-11 2020-06-16 北京东方通科技股份有限公司 Secure middleware system
CN111708570A (en) * 2020-06-12 2020-09-25 河北善理软件科技有限公司 Batch integration method and device of security certificate, and terminal
CN117939469A (en) * 2024-03-20 2024-04-26 国网山东省电力公司莱芜供电公司 Method and system for maintaining digital certificate at power terminal

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090305673A1 (en) * 2008-06-06 2009-12-10 Ebay, Inc. Secure short message service (sms) communications
CN102411742A (en) * 2011-12-27 2012-04-11 大唐微电子技术有限公司 Mobile terminal
CN103002430A (en) * 2011-09-09 2013-03-27 中国移动通信集团公司 Method, device and system for binding terminal applications to terminal numbers
CN103067335A (en) * 2011-10-18 2013-04-24 中国移动通信集团公司 Method for realizing information interaction as non-contact mode, correlation equipment and system
CN103793818A (en) * 2014-01-01 2014-05-14 广东维升科技股份有限公司 Multi-intelligent-card paying system, method, mobile paying terminal and credible platform
CN104021351A (en) * 2014-05-28 2014-09-03 宇龙计算机通信科技(深圳)有限公司 Method and device for data resource access

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090305673A1 (en) * 2008-06-06 2009-12-10 Ebay, Inc. Secure short message service (sms) communications
CN103002430A (en) * 2011-09-09 2013-03-27 中国移动通信集团公司 Method, device and system for binding terminal applications to terminal numbers
CN103067335A (en) * 2011-10-18 2013-04-24 中国移动通信集团公司 Method for realizing information interaction as non-contact mode, correlation equipment and system
CN102411742A (en) * 2011-12-27 2012-04-11 大唐微电子技术有限公司 Mobile terminal
CN103793818A (en) * 2014-01-01 2014-05-14 广东维升科技股份有限公司 Multi-intelligent-card paying system, method, mobile paying terminal and credible platform
CN104021351A (en) * 2014-05-28 2014-09-03 宇龙计算机通信科技(深圳)有限公司 Method and device for data resource access

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107093078A (en) * 2017-03-14 2017-08-25 南方城墙信息安全科技有限公司 Chip card card sending system and method
CN107093078B (en) * 2017-03-14 2021-01-19 南方城墙信息安全科技有限公司 Chip card issuing system and method
WO2019007145A1 (en) * 2017-07-03 2019-01-10 中兴通讯股份有限公司 Sfs access control method and system, sfs and terminal device
CN111291366A (en) * 2020-05-11 2020-06-16 北京东方通科技股份有限公司 Secure middleware system
CN111708570A (en) * 2020-06-12 2020-09-25 河北善理软件科技有限公司 Batch integration method and device of security certificate, and terminal
CN117939469A (en) * 2024-03-20 2024-04-26 国网山东省电力公司莱芜供电公司 Method and system for maintaining digital certificate at power terminal
CN117939469B (en) * 2024-03-20 2024-07-09 国网山东省电力公司莱芜供电公司 Method and system for maintaining digital certificate at power terminal

Also Published As

Publication number Publication date
CN105743651B (en) 2019-06-04

Similar Documents

Publication Publication Date Title
US9843569B2 (en) Method and apparatus for access credential provisioning
CN109992949B (en) Equipment authentication method, over-the-air card writing method and equipment authentication device
KR20170134631A (en) User authentication method and apparatus, and wearable device registration method and apparatus
CN103888252A (en) UID, PID, and APPID-based control application access permission method
US9942047B2 (en) Controlling application access to mobile device functions
US20160142210A1 (en) Signatures for near field communications
CN110908786A (en) Intelligent contract calling method, device and medium
CN105743651A (en) Method and apparatus for utilizing card application in chip security domain, and application terminal
CN104199657A (en) Call method and device for open platform
CN105160776B (en) City one-card card, business platform, card operation system and implementation method
CN111431840A (en) Security processing method and device
CN111404706A (en) Application downloading method, secure element, client device and service management device
EP3048553B1 (en) Method for distributing applets, and entities for distributing applets
CN113868713B (en) Data verification method and device, electronic equipment and storage medium
US10025575B2 (en) Method for installing security-relevant applications in a security element of a terminal
JP5781678B1 (en) Electronic data utilization system, portable terminal device, and method in electronic data utilization system
CN105574720A (en) Secure information processing method and secure information processing apparatus
KR20090064269A (en) Method for moving rights object and method for managing rights of issuing rights object and system thereof
JP2017530492A (en) Authentication system and method
Akram et al. A novel consumer-centric card management architecture and potential security issues
KR20120071945A (en) Method and system for appling usim certificate to online infrastructure
JP2010117995A (en) System, device and method for issuing application
CN104639566A (en) Transaction authorizing method based on out-of-band identity authentication
CN115221562A (en) Browser file signature method and device and computer readable storage medium
EP3048776B2 (en) Methods for managing content, computer program products and secure element

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant